US20070283160A1 - Low Cost Secure ID Card and System - Google Patents

Low Cost Secure ID Card and System Download PDF

Info

Publication number
US20070283160A1
US20070283160A1 US11/566,135 US56613506A US2007283160A1 US 20070283160 A1 US20070283160 A1 US 20070283160A1 US 56613506 A US56613506 A US 56613506A US 2007283160 A1 US2007283160 A1 US 2007283160A1
Authority
US
United States
Prior art keywords
card
secret information
reader
operable
radio frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/566,135
Other versions
US7536721B2 (en
Inventor
John Steven
Paul Waterhouse
Christopher Verge
Kenneth Truong
Jason August
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visible Assets Inc
Original Assignee
Visible Assets Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/US2001/026840 external-priority patent/WO2002019092A1/en
Application filed by Visible Assets Inc filed Critical Visible Assets Inc
Priority to US11/566,135 priority Critical patent/US7536721B2/en
Publication of US20070283160A1 publication Critical patent/US20070283160A1/en
Application granted granted Critical
Publication of US7536721B2 publication Critical patent/US7536721B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B17/00Franking apparatus
    • G07B17/00185Details internally of apparatus in a franking system, e.g. franking machine at customer or apparatus at post office
    • G07B17/00193Constructional details of apparatus in a franking system
    • G07B2017/00209Mailbox, i.e. container for outgoing mail
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00206Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier being hand operated
    • G07C2009/00222Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier being hand operated by more than one push button
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/0023Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks with encription of the transmittted data signal
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • G07C2009/00642Power supply for the lock by battery
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses

Definitions

  • the invention relates to security systems and devices (e.g. identification cards) for locking and unlocking secure areas, such as entryways (e.g. doors, gates) and closable receptacles, and for safeguarding secure areas by verifying authorization of, and tracking, individuals located therein.
  • security systems and devices e.g. identification cards
  • secure areas such as entryways (e.g. doors, gates) and closable receptacles
  • ID cards In attempts to enhance secure identification of individuals many identification (ID) cards have been created using smart chips (such as U.S. Pat. No. 5,477,039, issued Dec. 19, 1995 to Lisimaque et al ). These chips optionally contain data storage that holds the individual's biometric date such as facial images, fingerprints, or retinal scans (such as U.S. Pat. No. 5,717,776, issued Feb. 10, 1998 to Watanabe, U.S. Pat. No. 5,787,186, issued Jul. 28, 1998 to Schroeder, and U.S. Pat. No. 6,219,439, issued Apr. 17, 2001 to Burger). To obtain entry to secure area, the individual is required to insert his/her card into a reader.
  • biometric date such as facial images, fingerprints, or retinal scans (such as U.S. Pat. No. 5,717,776, issued Feb. 10, 1998 to Watanabe, U.S. Pat. No. 5,787,186, issued Jul. 28, 1998 to S
  • the reader reads the biometric data contained on the chip and performs the detailed biometric test on the individual via devices that can read fingerprints, retinal scans, or other identifying biometric characteristics.
  • the systems may provide very high security in areas where positive identification of the individual is required; however, the biometric readers are both expensive and complex. Such systems cannot be used reliably in high-volume areas, with many transient employees, or applications requiring routine positive identification for entry to the secure area without great cost such as airport entrances, or access to air traffic control rooms, or medium level security areas.
  • ID cards have named account numbers and other personal information encoded, either on a chip, or use a short range passive RF link, or alternatively a magnetic stripe card may be inserted into a reader capable of reading this information.
  • the individual may be asked to enter a personal identification number, or what is commonly called a PIN, on a door's keypad to obtain entry into a secure area (such as U.S. Pat. No. 4,839,506, issued Jun. 13, 1989 to Homma et al).
  • a simple keypad is placed on the door and a code must be entered into the keypad to allow entry without a separate card (such as U.S. Pat. No. 4,887,445, issued Dec. 19, 1989 to Beatty, U.S. Pat.
  • a third method of secure access is simply to have a physical card with optional identity information associated with the card. For example, a picture, or the individuals name and address.
  • the card may be placed in a reader to obtain access, or in some cases may transmit a signal to a reader that might open a door.
  • the same system is used widely for automobile entry, where small “keyfobs” are used to transmit a unique signal to an automobile to open the doors and in some cases start the automobile.
  • these wireless “keyfob” security system depend only upon holding onto (and not losing) a physical device to obtain entry and no independent checks of the person's actual identity or authorization to use the card or “keyfob” can be made.
  • the security in this case is similar to the security afforded by the usual metallic mechanical key, which can be duplicated, and provides no assurance that its holder is authorized for entry.
  • a similar access system can be implemented using a cell phone, where a special number is called on the cell phone to make a purchase from a vending machine or gas pump. After the number is dialed, a special PIN number may be entered to verify the account holder's identity, and the machine of gas pump is unlocked (such as U.S. Pat. No. 6,535,726, issued Mar. 18, 2003, to Johnson).
  • the present invention provides a method, system and device (e.g. ID card) that provides enhanced security for positive identification, and for individual as well as automatic entry into a secure area.
  • ID card e.g. ID card
  • the invention broadly provides a system for controlling the operating state of a lock comprising:
  • the radio frequency identity card further comprise an energy storage device (e.g a battery) operable to energize the wireless transmitter, and that the aforesaid radio frequency reader and the aforesaid wireless communication means (e.g. transmitter) be operable at only a low radio frequency not exceeding 1 megahertz.
  • the use of such low frequencies e.g. 300 Khz or 128 KHz
  • a typical RF frequency for active cards and tags is, for example, 433 MHz, which causes a rapid drain of a battery in the card (or at a reader).
  • low frequencies ⁇ 1 MHz
  • the use of low RF frequencies not exceeding 1.0 MHz importantly extends the life of the energy storage devices (e.g. batteries) that may be incorporated in the ID card/ID key and reader to energize their respective components, thereby greatly enhancing the utility of both RF ID key tags and of their readers.
  • the aforesaid data processor/cpu be disposed within the aforesaid card (e.g. in the form of a microprocessor chip) and be operable to convert the encoded secret information into an unlocking signal and to provide that unlocking signal to the aforesaid wireless communication means.
  • both the aforesaid reader and data processor/cpu may be disposed at the lock, the data processor/cpu being operable to convert the encoded secret information into an unlocking signal and to provide that unlocking signal to the reader to unlock the aforesaid lock.
  • the invention also provides a system of tracking movements of individuals within a secure area, the aforesaid system comprising:
  • the aforesaid data processor/cpu may be disposed within the card, or at the reader, and is operable to convert the encoded secret information into an authorization code.
  • the invention further provides an electronic identity card comprising:
  • the aforesaid display comprises a permanent ID label attached to the card, the aforesaid label containing public identity information relating to the aforesaid individual.
  • the display comprises a LCD display on the ID card to display the aforesaid encoded secret information.
  • the aforesaid identity card further comprises a low frequency (e.g. less than 1 MHz) wireless communication means (e.g. transmitter) operable to transmit the aforesaid encoded secret information to a reader spaced away from the identity card.
  • the communication means may comprise a receiver for receiving a command signal from the reader and for displaying the aforesaid public information on the display in response to the aforesaid command signal.
  • the novel ID card further comprises an indicator device (e.g. LED), the aforesaid communication means then comprising a receiver for receiving a command signal from the reader and for activating the indicator device in response to the aforesaid command signal.
  • an indicator device e.g. LED
  • the invention also provides an electronic identity card comprising:
  • the wireless communication means is operable at a low radio frequency not exceeding 1 megahertz.
  • the aforesaid electronic encoding means comprises a data processor/CPU and a data storage device. operable to store a lookup table/database of instances of secret information and corresponding instances of encoded secret information.
  • the aforesaid electronic encoding means may comprise a data processor/CPU operable to algorithmically convert the aforesaid secret information into the aforesaid encoded secret information.
  • the aforesaid wireless communication means is operable to transmit both the aforesaid secret information and the aforesaid encoded secret information to a reader, such reader being in operative communication with a lock to control a locked state thereof.
  • the aforesaid card comprises an indicator device (e.g. LED), the aforesaid communication means comprising a receiver for receiving a command signal from the aforesaid reader and for activating the aforesaid indicator device in response to the command signal.
  • the aforesaid communication means comprising a receiver for receiving a command signal from the aforesaid reader and for activating the aforesaid indicator device in response to the command signal.
  • the invention also provides a method for controlling the operating state of a lock characterized by a locked state and an unlocked state, the aforesaid method comprising:
  • the aforesaid comparing step (b) is carried out by a data processor/cpu disposed within the aforesaid card and operable to convert the aforesaid secret information into an unlocking signal and to provide such unlocking signal to a wireless communication means.
  • the aforesaid comparing step (b) may be carried out by a data processor/cpu disposed at the aforesaid reader, such data processor/cpu being operable to convert the encoded secret information into an unlocking signal and to provide such unlocking signal to the reader to unlock said lock.
  • the invention also provides a method of tracking movements of individuals within a secure area, said method comprising:
  • the electronic input device on the ID card may take many forms, such as a voice recognition microphone with associated software, although a simple electronic keypad is currently preferred, based on cost and simplicity considerations.
  • the benefits of the invention can be achieved by providing each individual with a intelligent ID card that includes a small low-cost keyboard, and preferably a Liquid Crystal Display (LCD), an optional light emitting diode (LED) and an short range radio or IR data link (for example, at a radio frequency (RF) of less than 1 MHz, such as 300 Khz or even 128 KHz).
  • a radio frequency for example, at a radio frequency (RF) of less than 1 MHz, such as 300 Khz or even 128 KHz.
  • RF radio frequency
  • the use of such low frequencies is important because they extend the life (when compared to the use of widely used high frequencies in the range of 100 MHz) of the energy storage devices (e.g. batteries) that may be incorporated in the ID card/ID key to energize their respective components
  • the user may wear the card on a neck chain and as the user approaches a secure entryway, an RF Base Station located at the entry-way/door would cause the LED on the card to flash, thereby indicating that the door requires a PIN number to enter.
  • the user On the card's keypad, the user would then enter a secret PIN number code that is specific for this card and the card would transmit a RF signal with this PIN code to the RF reader at the entry point of this door. If the correct number was entered by the user, the door will open.
  • the secret PIN is entered on the RF card's keypad by the user and then an encrypted version of the PIN code, which had previously been stored in the card, is compared to the keypad-entered PIN code. If they match the card transmits a digital code that opens the door.
  • the Wireless Key/RF card 1 will first confirm that the PIN number (entered at keypad buttons 56 ) is correct and then transmit both a special code to open the door lock (locking mechanism 57 ) plus the PIN number, whereupon the two numbers are compared to a database that is contained or accessed by a data processor/CPU 51 communicating with, and preferably located at, the lock 57 to first check both the PIN and the code before opening the door.
  • a data processor/CPU 51 communicating with, and preferably located at, the lock 57 to first check both the PIN and the code before opening the door.
  • the transmitter 63 of ID card 1 may transmit only the keypad 65 -entered PIN number, which is compared to a data base of access codes held in a storage device/programmable memory 62 at the door, and if correct, the door is unlocked.
  • an LCD display provided on the wireless ID card makes it possible to also confirm a person's actual identity, thereby ensuring that he/she is authorized to use the card.
  • a card reader that is operable to detect the ID card, may flash the ID card's LED and may make the card's LCD display go blank via a challenge command transmitted over the low frequency ( ⁇ 1 MHz) RF wireless link from the reader.
  • the user may then be prompted to enter the PIN number on buttons of the card's keypad, whereupon the data processor/CPU located in the card (or, upon RF transmittal, the CPU at the reader) calculates a public key number/indicator from the secret PIN number and causes display of that calculated public number on the LCD.
  • the corresponding correct public number may be preprinted on a picture ID card that is attached to the ID keycard (or otherwise pre-known or predefined for comparison purposes); a security guard may then readily confirm the cardholder's identity by checking to see whether that the LCD-displayed public number matches the preprinted/predefined public number.
  • READER DETECTS CARD RF CHALLENGE TO CARD—AUTOMATIC OR KEYPAD ID RESPONSE FROM CARD ⁇ PUBLIC NUMBER CALCULATED AT CARD OR READER AND DISPLAYED AT CARD'S LCD ⁇ COMPARE CALCULATED PUBLIC NUMBER WITH PREDEFINED PUBLIC NUMBER (E.G. BY SECURITY GUARD) ⁇ AUTHORIZE/EXCLUDE CARDHOLDER
  • the RF card (wireless key) 1 may transmit, by low frequency RF on link 64 , the secret PIN number (entered on buttons 65 of the card's keypad) to a base station (directly or via retransmission by the card reader) having a central processing unit 61 (CPU) connected thereto, whereupon the central processing unit 61 would then carry out the calculation on the secret PIN number and open a door lock (locking mechanism) 66 or transmit the results (e.g. a public key) for display on the card's LCD display (not shown).
  • a base station directly or via retransmission by the card reader
  • CPU central processing unit 61
  • the central processing unit 61 would then carry out the calculation on the secret PIN number and open a door lock (locking mechanism) 66 or transmit the results (e.g. a public key) for display on the card's LCD display (not shown).
  • the base station can also place special codes or letters on the LCD, as a request or challenge to the cardholder to enter (on the card's keypad) other special numbers (other than the PIN), such as birth date, or Social Security Number, whereupon the validity of the entered special numbers may be confirmed by an RF-transmitted message from the base station on the card's LCD.
  • the displayed message may also be a public code that can be matched against a public code preprinted on the ID card.
  • These challenge questions may be calculated on the RF card or transmitted to the base station via the RF link and then computed on a central server/data processor 61 , which may open the lock 66 or simultaneously transmit the results of the match to the internet or to a security department connected to a private network.
  • RF card and base station will use low frequencies (e.g. under 1 MHz, such as 128 KHz) to advantageously maximize battery life in the RF ID card (and at the reader if the latter is battery powered).
  • low frequencies e.g. under 1 MHz, such as 128 KHz
  • the base station interrogates cards via a loop antenna (field antenna) placed either in the floor or ceiling it is possible to localize and record an individual cardholder's progress, in position and time, as the individual proceeds through a secure facility. It is also possible, in accordance with the invention, to have a network comprising a large number of such ID's all within the reading range of one loop antenna (or interconnected set of loop antennae) that can be periodically interrogated by the base station. It should be noted that an additional advantage of low RF frequencies is that the cost of integrated circuits used for detection and transmittal of low RF frequencies is greatly reduced since CMOS based circuits may be used.
  • the tags may also be read and programmed by low cost handheld readers using a low frequency loop antenna communication link.
  • Low cost locks may also be created using a simple CMOS chip set similar to that shown in FIG. 4 , so that the lock and card set (together) may currently be manufactured at reasonable cost (e.g. for under $25.00).
  • FIG. 1 is a schematic front view of an RF ID card tag/key in accordance with the present invention.
  • FIG. 2 is another front view of the RF ID card of FIG. 1 , showing a photo ID card which may be incorporated therein.
  • FIG. 3 is a schematic rear view showing the back of the RF ID card of FIG. 1 and the keypad of keys thereon.
  • FIG. 4 is a schematic view of a novel RF ID card being used to open an electronic lock at a closed door.
  • FIG. 5 is a schematic block diagram of typical functional components of an RF ID card of the type shown in FIG. 1 .
  • FIG. 6 is a schematic view of a system, in accordance with the invention, for tracking movements of individuals within a secure area, each individual being provided with an RF ID card of the type illustrated in FIGS. 1-3 .
  • FIG. 7 is a schematic view of a handheld reader being used to check the identity of an ID card selected from a group of ID cards carried by corresponding cardholders.
  • FIG. 8 is a schematic block diagram showing the interaction of an electronic lock with and an RF card that incorporates a CPU data processor (e.g. microprocessor) and database.
  • a CPU data processor e.g. microprocessor
  • FIG. 9 is a schematic block diagram showing the interaction of an electronic lock having a CPU data processor and database with and an RF card that does not incorporate a CPU data processor.
  • FIG. 1 illustrates the front view of a typical RF ID card/tag 1 in accordance with the invention.
  • the card 1 in a preferred embodiment, can be approximately 21 ⁇ 2 inches by three and inches (i.e. slightly larger than a typical to credit card) and approximately 1 ⁇ 8th inch thick.
  • the small hole 2 shown in FIG. 1 at the top of the card 1 is intended for use with an optional chain so that the card 1 can be conveniently held around the user's neck.
  • LED's 3 Two light emitting diodes (LED's) 3 are shown in positions on either side of hole.
  • the LED's 3 may optionally be multicolor or, alternatively, one may be green and the other red.
  • an optional liquid Crystal Display (LCD). display 4 which may be numeric or alphanumeric.
  • display 4 Below the display 4 , an area 5 is reserved for a photo ID card 6 (as shown in FIG. 2 ) on flat face 1 a of card 1 .
  • a photo ID card 6 may optionally be attached by insertion into a plastic pouch adhering to the RF ID card/tag 1 by adhesive on the back of the photo ID card 6 , or with adhesive directly applied to the RF card/tag, or by other mechanical means.
  • FIG. 2 illustrates that a photo ID card 6 may optionally be attached by a plastic pouch with adhesive on the back thereof, with adhesive directly applied to the ID photo card 6 , or other mechanical means.
  • a desired public ID number 7 or other non-confidential sign may be printed on the RF card 1 (or on the attached photo ID card 6 ), so that number 7 may be visually compared to a number or sign 7 viewable in the LCD display 4 above it, by a security guard, for example.
  • the user may be required to enter the PIN number 7 via the keypad 8 on the flat back 9 to RF card 1 (see FIG. 3 below), and the public key 7 displayed on display 4 on the front of RF card 1 is then calculated by a CPU 14 located within the RF card 1 (see FIG. 5 ).
  • the PIN number that is entered on the card's keypad may be sent via an RF link to a central server, which then calculates the public (non-confidential/non-secret) key and then returns that public key to the RF card for display on the LCD thereof.
  • Other optional methods may also be used to calculate other numbers such as birth date, Social Security number, etc.
  • the public number is preferably long and unique and may be easily, and uniquely, calculated from a shorter secret PIN number entered on the RF card's keypad; by contrast, the secret PIN number may not be uniquely calculated from the public number. This is effectively a digital signature based on a secret 4 digit PIN password.
  • the PIN number and the longer public ID number may be simply stored in the card's memory.
  • the four bit microprocessor then simply compares the number entered on the keypad with the stored number and displays the public number.
  • FIG. 3 illustrates the back view of the ID tag, in a preferred embodiment.
  • Small buttons 8 of a keypad with symbols including * and # may be placed on the backside of the ID card 1 using rubber dome switches, or alternatively conventional membrane switches may be used to create a very flat profile.
  • This keypad of entry buttons 8 may be used for a variety of purposes including entry of secret PIN numbers, birthdates, Social Security numbers, or the like, which are known only to the individual carrying the ID card 1 .
  • FIG. 4 illustrates the preferred use of the RF ID card 1 (which may herein sometimes be called an “RF key” or “RF tag”) in opening a secure door 10 when brought within an effective transmission/communication range 12 .
  • RF key e.g. 128 KHz
  • RF tag RF tag
  • a preferred low power lock system is disclosed in U.S. provisional application No. 60/485860, filed Jul. 9, 2003, and entitled Integrated Lock, Drop-Box, and Delivery System and Method”.
  • the user may open the door 10 using an RF ID card 1 , or a card 1 and secret PIN number without any connection to a server of computer.
  • This embodiment provides for a secure low cost access system that does not require any external wiring.
  • the door 10 may have no key pads or other visible objects or markings to indicate that it is a secure entryway.
  • FIG. 5 shows a block diagram of the functional component sections of a novel wireless key or RF access card 1 , including an optional GPS chip set or GPS detector 13 to help locate the geographical position of a card user.
  • FIG. 5 also shows the LCD display 4 , a 4-bit microprocessor/CPU 14 , a memory (data storage device) 15 , an energy storage device in the form of a battery 18 , a loop antenna 16 , an RF modem serving as a transceiver 17 for communicating with a reader (as shown in FIG. 6 as base station Ww), and buttons 8 to enter commands (e.g. Open/close).
  • keypad data entry buttons 8 may be located on the RF card 1 and connected to the CPU 14 for operations such as comparison by the CPU 14 of keypad-entered numbers with those stored in the memory 15 or displayed on the LCD display 4 .
  • FIG. 6 illustrates another use of the RF cards 1 , for tracking the location of individuals within a secure area.
  • RF cards 1 By placing large (e.g. 50 feet in diameter) field loop antennas 19 in walls, floor, or ceiling of a secure building, it is possible to create a network of wireless keys or RF access cards 1 carried by an individual after entering the secure building or secure area.
  • Each RF card 1 can transmit at low frequency ( ⁇ 1.0 MHz), via a field antenna 19 , to the base station/reader 20 , which is connected to CPU/server 21 , to confirm that each RF card 1 is present in the loop 19 .
  • FIG. 7 illustrates the use of a small handheld reader 20 with a limited range of reception and transmission (i.e. Rx/Tx 12 ) to nearby RF cards 1 .
  • This reader 20 can be used to check identity of an RF cardholder, and optionally to program an RF card 1 for a new identity, when authorized.
  • a receiving unit or reader/base station 20 comprises an antenna 50 and a first central processing unit 51 .
  • the reader 20 is cooperatively positioned at a secure entryway, the first central processing unit 51 communicatively connected to the reader's antenna 50 , and the reader's antenna communicatively connected to a transmitter 52 of a wireless key/RF card 1 via a wireless link 53 , advantageously at a low RF frequency of less than 1 MHz (e.g. 300 Khz or 128 KHz).
  • the wireless key/RF card 1 comprises a programmable memory 54 , a second central processing unit 55 , and a transmitter 52 (which should be understood to include an antenna and a receiving section), the wireless key 1 being physically separate from the secure doorway and typically stored in locations inaccessible to unauthorized users of the secure door.
  • the wireless key 1 further comprises a key pad 56 with a plurality of buttons, the buttons being used to enter a secret access code.
  • the second central processing unit 55 of the wireless key proceeds to determine whether the access code entered is consistent with the access code stored in the programmable memory 54 .
  • the transmitter 52 of the wireless key/RF card 1 Upon the second central processing unit 55 determining that the access code entered is acceptable, the transmitter 52 of the wireless key/RF card 1 transmits a signal to the reader's antenna 50 when the user pushes an appropriate “OPEN” button.
  • the first central processing unit 51 receives a signal from the antenna 50 and subsequently disengages the locking mechanism 57 to allow access to the interior of the secure door or area.
  • FIG. 9 Another embodiment of the invention, as shown in FIG. 9 , involves a receiving unit or reader/base station 20 comprising an antenna 60 , a programmable memory 61 , and a central processing unit 62 .
  • the reader 20 is cooperatively positioned within a secure area at a secured entryway, with the central processing unit 61 communicatively connected to the reader antenna 60 and the programmable memory 62 , and the reader antenna 60 communicatively connected to a transmitter 63 of a wireless key via a wireless link 64 , preferably at a low RF frequency of less than 1 MHz (e.g. 300 Khz or 128 KHz).
  • the wireless key 1 comprises a transmitter 63 (which should be understood to include an antenna and a receiving section) that transmits a plurality of unlocking signals in sequential order, with one unlocking signal being sent upon the pushing of one of the buttons of the keypad 65 of the wireless key/RF card 1 .
  • the plurality of unlocking signals are received by the antenna 60 of reader 20 and processed by the central processing unit 61 . If the sequence of unlocking signals transmitted by the wireless key 1 is consistent with the access code stored in the programmable memory 62 , then the central processing unit 61 disengages the locking mechanism 66 of the secure door, thereby allowing the user of the wireless key/RF card 1 to be permitted access to the interior of the secure area.

Abstract

The invention provides a method for controlling the operating state of a lock characterized by a locked state and an unlocked state. The method comprises: entering secret information on an electronic input device (e.g. keypad) located on a radio frequency identity card, then electronically comparing the secret information against an authorized code to determine whether the secret information is authorized, then transmitting by radio frequency an unlocking signal to a radio frequency reader located at the lock for opening the lock in the event that the secret information is authorized. In a related use of such RF identity cards, the invention also provides a system and method of tracking movements of individuals within a secure area. The method comprises the steps of: using a loop antenna operable to transmit and receive RF signals from at least one radio frequency (RF) identity card carried by an individual; transmitting RF signals at a frequency not exceeding 1 megahertz from a reader through the loop antenna to the aforesaid RF card to request a secret code; entering this secret code on an electronic input device (e.g. keypad) device located on the RF card, transmitting this secret code to the reader through a transceiver disposed on the RF card; and using a data processor/CPU located at the reader to determine whether the secret code corresponds to the aforesaid authorization.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims priority from and incorporates by reference 1) U.S. United Provisional Patent Application No. 60/466,016, filed on Apr. 28, 2003 and 2) U.S. Provisional Patent Application No. 60/485,860, filed on Jul. 9, 2003.
  • This application is a Continuation-In-Part of U.S. Nonprovisional patent application Ser. No. 10/415502, filed Apr. 28, 2003, which is a U.S. national application based on PCT/US01/26840 having an international filing date of Aug. 28, 2001, which has priority based upon U.S. Provisional Patent Application No. 60/228555, filed Aug. 28, 2000.
  • FIELD OF THE INVENTION
  • The invention relates to security systems and devices (e.g. identification cards) for locking and unlocking secure areas, such as entryways (e.g. doors, gates) and closable receptacles, and for safeguarding secure areas by verifying authorization of, and tracking, individuals located therein.
  • BACKGROUND OF THE INVENTION
  • In attempts to enhance secure identification of individuals many identification (ID) cards have been created using smart chips (such as U.S. Pat. No. 5,477,039, issued Dec. 19, 1995 to Lisimaque et al ). These chips optionally contain data storage that holds the individual's biometric date such as facial images, fingerprints, or retinal scans (such as U.S. Pat. No. 5,717,776, issued Feb. 10, 1998 to Watanabe, U.S. Pat. No. 5,787,186, issued Jul. 28, 1998 to Schroeder, and U.S. Pat. No. 6,219,439, issued Apr. 17, 2001 to Burger). To obtain entry to secure area, the individual is required to insert his/her card into a reader. The reader reads the biometric data contained on the chip and performs the detailed biometric test on the individual via devices that can read fingerprints, retinal scans, or other identifying biometric characteristics. The systems may provide very high security in areas where positive identification of the individual is required; however, the biometric readers are both expensive and complex. Such systems cannot be used reliably in high-volume areas, with many transient employees, or applications requiring routine positive identification for entry to the secure area without great cost such as airport entrances, or access to air traffic control rooms, or medium level security areas.
  • Other ID cards have named account numbers and other personal information encoded, either on a chip, or use a short range passive RF link, or alternatively a magnetic stripe card may be inserted into a reader capable of reading this information. In turn the individual may be asked to enter a personal identification number, or what is commonly called a PIN, on a door's keypad to obtain entry into a secure area (such as U.S. Pat. No. 4,839,506, issued Jun. 13, 1989 to Homma et al). In many other cases, a simple keypad is placed on the door and a code must be entered into the keypad to allow entry without a separate card (such as U.S. Pat. No. 4,887,445, issued Dec. 19, 1989 to Beatty, U.S. Pat. No. 3,953,769, issued Apr. 27, 1976 to Sopko, and U.S. Pat. No. 5,704,151, issued Jan. 6, 1998 to West et al, relating to a keypad on gun lock)). These keypad approaches provides only limited security when many individuals in high-volume areas such as airports, or office doors.
  • One major problem with systems that use a keypad located at the door, is that the codes must be frequently changed and distributed to many people on a weekly or daily basis. This process leads to significant security risks because the codes are often written down and provided in e-mail or memorandum form for the benefit of authorized individuals. It also becomes necessary to change the code whenever even a single individual leaves the employment of the company using such a keypad-guarded door. An alternative approach is to use a door with many different codes, one for each individual making use of the door. In that case, only a single code must be changed if an individual leaves employment of the company. However, as the number of codes that are capable of opening the door increases, the security level of entry decreases. In the simple case, if the door has three buttons labeled 1,2,3 and a code of only three digits for use (e.g. 3,2,1), the likelihood of entry by an unauthorized intruder is one out of nine, since there are only nine possible combinations. If the company wanted to provide unique access to four employees, giving each a unique code, the likelihood of entry by a non-authorized intruder now rises to four out of nine. In other words, an intruder enjoys almost a 50% probability of guessing a code that would allow unauthorized entry, and the security level of the door is therefore significantly decreased.
  • A third method of secure access, is simply to have a physical card with optional identity information associated with the card. For example, a picture, or the individuals name and address. The card may be placed in a reader to obtain access, or in some cases may transmit a signal to a reader that might open a door. The same system is used widely for automobile entry, where small “keyfobs” are used to transmit a unique signal to an automobile to open the doors and in some cases start the automobile. Again these wireless “keyfob” security system depend only upon holding onto (and not losing) a physical device to obtain entry and no independent checks of the person's actual identity or authorization to use the card or “keyfob” can be made. The security in this case is similar to the security afforded by the usual metallic mechanical key, which can be duplicated, and provides no assurance that its holder is authorized for entry.
  • Finally, a similar access system can be implemented using a cell phone, where a special number is called on the cell phone to make a purchase from a vending machine or gas pump. After the number is dialed, a special PIN number may be entered to verify the account holder's identity, and the machine of gas pump is unlocked (such as U.S. Pat. No. 6,535,726, issued Mar. 18, 2003, to Johnson).
  • SUMMARY OF THE INVENTION
  • The present invention provides a method, system and device (e.g. ID card) that provides enhanced security for positive identification, and for individual as well as automatic entry into a secure area.
  • The invention broadly provides a system for controlling the operating state of a lock comprising:
      • a) a lock characterized by a locked state and an unlocked state;
      • b) a radio frequency reader, said reader being in operative communication with a lock to control the state thereof,
      • c) a radio frequency identity card comprising:
        • i) an electronic input device (e.g. keypad) located on said card for entry of secret information by an individual;
        • ii) an electronic encoding means for facilitating conversion of said secret information into encoded secret information, said encoded secret information being determinative of authorization of said individual;
        • iii) a wireless communication means (e.g. a wireless transmitter) operable to transmit information to said reader.
      • c) a data processor (e.g. CPU or central processing unit) operable to determine whether said secret information corresponds to said authorization.
  • It is preferable that the radio frequency identity card further comprise an energy storage device (e.g a battery) operable to energize the wireless transmitter, and that the aforesaid radio frequency reader and the aforesaid wireless communication means (e.g. transmitter) be operable at only a low radio frequency not exceeding 1 megahertz. It may be noted that the use of such low frequencies (e.g. 300 Khz or 128 KHz) is both unexpected, because a typical RF frequency for active cards and tags is, for example, 433 MHz, which causes a rapid drain of a battery in the card (or at a reader). The use of low frequencies (<1 MHz) is thus unexpectedly advantageous in reducing power requirements and enabling a long, practical, usable life for both the novel RF ID cards herein and for any battery-powered reader used to read the cards. The use of low RF frequencies not exceeding 1.0 MHz (when compared to the use of widely used high frequencies in the range of 100 MHz) importantly extends the life of the energy storage devices (e.g. batteries) that may be incorporated in the ID card/ID key and reader to energize their respective components, thereby greatly enhancing the utility of both RF ID key tags and of their readers.
  • Moreover, it is preferable that the aforesaid data processor/cpu be disposed within the aforesaid card (e.g. in the form of a microprocessor chip) and be operable to convert the encoded secret information into an unlocking signal and to provide that unlocking signal to the aforesaid wireless communication means.
  • Alternatively, both the aforesaid reader and data processor/cpu may be disposed at the lock, the data processor/cpu being operable to convert the encoded secret information into an unlocking signal and to provide that unlocking signal to the reader to unlock the aforesaid lock.
  • The invention also provides a system of tracking movements of individuals within a secure area, the aforesaid system comprising:
      • a) a loop antenna operable to transmit and receive RF signals from at least one radio frequency identity card;
      • b) a reader comprising a radio frequency transceiver operatively connected to the aforesaid loop antenna;
      • c) at least one radio frequency identity card which can be located within communication range of the aforesaid loop antenna, the aforesaid radio frequency identity card comprising:
        • i) an electronic input device (e.g. keypad) located on the aforesaid card for entry of secret information by an individual;
        • ii) an electronic encoding means for facilitating conversion of the aforesaid secret information into encoded secret information, the aforesaid encoded secret information being determinative of authorization of the aforesaid individual;
        • iii) a wireless communication means (e.g. transmitter) operable to transmit information to the aforesaid reader;
      • d) a data processor/cpu operable to determine whether the aforesaid secret information corresponds to the aforesaid authorization.
  • As will be understood, the aforesaid data processor/cpu may be disposed within the card, or at the reader, and is operable to convert the encoded secret information into an authorization code.
  • The invention further provides an electronic identity card comprising:
      • a) an electronic input device (e.g. keypad) located on the aforesaid card for entry of secret information by an individual;
      • b) a display for displaying public information for observation, the aforesaid public information having a relationship to the aforesaid secret information; and
      • c) an electronic encoding means for facilitating conversion of the aforesaid secret information into encoded secret information, the aforesaid encoded secret information being determinative of the existence of a required correspondence between the aforesaid secret information and the aforesaid public information to confirm the identity of the aforesaid individual.
  • Preferably, the aforesaid display comprises a permanent ID label attached to the card, the aforesaid label containing public identity information relating to the aforesaid individual.
  • Preferably, the display comprises a LCD display on the ID card to display the aforesaid encoded secret information.
  • Preferably, the aforesaid identity card further comprises a low frequency (e.g. less than 1 MHz) wireless communication means (e.g. transmitter) operable to transmit the aforesaid encoded secret information to a reader spaced away from the identity card. Advantageously, the communication means may comprise a receiver for receiving a command signal from the reader and for displaying the aforesaid public information on the display in response to the aforesaid command signal.
  • Preferably, the novel ID card further comprises an indicator device (e.g. LED), the aforesaid communication means then comprising a receiver for receiving a command signal from the reader and for activating the indicator device in response to the aforesaid command signal.
  • The invention also provides an electronic identity card comprising:
      • a) an electronic input device (e.g. keypad) located on the aforesaid card for entry of secret information by an individual;
      • b) an electronic encoding means for facilitating conversion of the aforesaid secret information into encoded secret information, the aforesaid encoded secret information being determinative of authorization of the aforesaid individual;
      • c) a wireless communication means (e.g. a wireless transmitter) operable to transmit the aforesaid encoded secret information to a reader, the aforesaid reader being in operative communication with a lock to control a locked state thereof.
  • Preferably, the wireless communication means is operable at a low radio frequency not exceeding 1 megahertz.
  • Preferably, the aforesaid electronic encoding means comprises a data processor/CPU and a data storage device. operable to store a lookup table/database of instances of secret information and corresponding instances of encoded secret information.
  • Alternatively, the aforesaid electronic encoding means may comprise a data processor/CPU operable to algorithmically convert the aforesaid secret information into the aforesaid encoded secret information.
  • Advantageously, the aforesaid wireless communication means is operable to transmit both the aforesaid secret information and the aforesaid encoded secret information to a reader, such reader being in operative communication with a lock to control a locked state thereof.
  • Preferably, the aforesaid card comprises an indicator device (e.g. LED), the aforesaid communication means comprising a receiver for receiving a command signal from the aforesaid reader and for activating the aforesaid indicator device in response to the command signal.
  • The invention also provides a method for controlling the operating state of a lock characterized by a locked state and an unlocked state, the aforesaid method comprising:
      • a) entering secret information on an electronic input device (e.g. keypad) located on a radio frequency identity card,
      • b) electronically comparing said secret information against an authorized code to determine whether the aforesaid secret information is authorized,
      • c) transmitting by radio frequency an unlocking signal to a radio frequency reader located at the aforesaid lock for opening the aforesaid lock in the event that the secret information is authorized.
  • Preferably, the aforesaid comparing step (b) is carried out by a data processor/cpu disposed within the aforesaid card and operable to convert the aforesaid secret information into an unlocking signal and to provide such unlocking signal to a wireless communication means.
  • Alternatively, the aforesaid comparing step (b) may be carried out by a data processor/cpu disposed at the aforesaid reader, such data processor/cpu being operable to convert the encoded secret information into an unlocking signal and to provide such unlocking signal to the reader to unlock said lock.
  • The invention also provides a method of tracking movements of individuals within a secure area, said method comprising:
      • a) using a loop antenna operable to transmit and receive RF signals (e.g. at a low frequency under 1 megahertz, such as 128 KHz) from at least one radio frequency (RF) identity card;
      • b) transmitting RF signals from a reader through said loop antenna to the aforesaid RF card to request a secret code;
      • c) entering the aforesaid secret code on an electronic input device (e.g. keypad) device located on the aforesaid RF card,
      • d) transmitting the aforesaid secret code to the aforesaid reader through a transceiver disposed on the aforesaid RF card; and
      • e) using a data processor/cpu located at the aforesaid reader, determining whether the aforesaid secret code corresponds to the aforesaid authorization.
  • According to the invention, the electronic input device on the ID card may take many forms, such as a voice recognition microphone with associated software, although a simple electronic keypad is currently preferred, based on cost and simplicity considerations.
  • Advantageously, the benefits of the invention can be achieved by providing each individual with a intelligent ID card that includes a small low-cost keyboard, and preferably a Liquid Crystal Display (LCD), an optional light emitting diode (LED) and an short range radio or IR data link (for example, at a radio frequency (RF) of less than 1 MHz, such as 300 Khz or even 128 KHz). The use of such low frequencies is important because they extend the life (when compared to the use of widely used high frequencies in the range of 100 MHz) of the energy storage devices (e.g. batteries) that may be incorporated in the ID card/ID key to energize their respective components
  • In a preferred embodiment of the invention, the user may wear the card on a neck chain and as the user approaches a secure entryway, an RF Base Station located at the entry-way/door would cause the LED on the card to flash, thereby indicating that the door requires a PIN number to enter. On the card's keypad, the user would then enter a secret PIN number code that is specific for this card and the card would transmit a RF signal with this PIN code to the RF reader at the entry point of this door. If the correct number was entered by the user, the door will open.
  • In one preferred embodiment, the secret PIN is entered on the RF card's keypad by the user and then an encrypted version of the PIN code, which had previously been stored in the card, is compared to the keypad-entered PIN code. If they match the card transmits a digital code that opens the door. This first method, makes it possible to use a low cost lock that does not require a separate database of PIN numbers. For clarity:
  • PIN ENTERED ON CARD KEYPAD→CARD'S CPU MATCHES PIN TO CARD DATABASE→CARD SENDS “OPEN” CODE BY RF→DOOR RF READER UNLOCKS DOORLOCK
  • According to a second method, for example as illustrated in FIG. 8, the Wireless Key/RF card 1 will first confirm that the PIN number (entered at keypad buttons 56) is correct and then transmit both a special code to open the door lock (locking mechanism 57) plus the PIN number, whereupon the two numbers are compared to a database that is contained or accessed by a data processor/CPU 51 communicating with, and preferably located at, the lock 57 to first check both the PIN and the code before opening the door. For clarity:
  • PIN ENTERED ON CARD KEYPAD→CARD'S CPU MATCHES PIN TO CARD'S DATABASE→CARD SEND BOTH PIN CODE AND “OPEN” CODE BY RF→DOOR RF READER AND READER'S CPU CHECKS BOTH CODE NUMBERS AGAINST DOOR DATABASE→DOOR UNLOCKS
  • In a third preferred embodiment, as shown in FIG. 9, the transmitter 63 of ID card 1 (Wireless Key/RF Card) may transmit only the keypad 65-entered PIN number, which is compared to a data base of access codes held in a storage device/programmable memory 62 at the door, and if correct, the door is unlocked. Again, for clarity:
  • PIN ENTERED ON CARD KEYPAD→CARD SENDS PIN BY RF→DOOR RF READER AND READER'S CPU CHECKS PIN AGAINST DOOR DATABASE→DOOR UNLOCKS
  • Preferably, an LCD display provided on the wireless ID card makes it possible to also confirm a person's actual identity, thereby ensuring that he/she is authorized to use the card. For example, when the person walks up to a secure area, a card reader, that is operable to detect the ID card, may flash the ID card's LED and may make the card's LCD display go blank via a challenge command transmitted over the low frequency (<1 MHz) RF wireless link from the reader. The user may then be prompted to enter the PIN number on buttons of the card's keypad, whereupon the data processor/CPU located in the card (or, upon RF transmittal, the CPU at the reader) calculates a public key number/indicator from the secret PIN number and causes display of that calculated public number on the LCD. The corresponding correct public number may be preprinted on a picture ID card that is attached to the ID keycard (or otherwise pre-known or predefined for comparison purposes); a security guard may then readily confirm the cardholder's identity by checking to see whether that the LCD-displayed public number matches the preprinted/predefined public number. For clarity: READER DETECTS CARD—RF CHALLENGE TO CARD—AUTOMATIC OR KEYPAD ID RESPONSE FROM CARD→PUBLIC NUMBER CALCULATED AT CARD OR READER AND DISPLAYED AT CARD'S LCD→COMPARE CALCULATED PUBLIC NUMBER WITH PREDEFINED PUBLIC NUMBER (E.G. BY SECURITY GUARD)→AUTHORIZE/EXCLUDE CARDHOLDER
  • As will now be understood, according to the third preferred embodiment (as further illustrated in FIG. 9), the RF card (wireless key) 1 may transmit, by low frequency RF on link 64, the secret PIN number (entered on buttons 65 of the card's keypad) to a base station (directly or via retransmission by the card reader) having a central processing unit 61 (CPU) connected thereto, whereupon the central processing unit 61 would then carry out the calculation on the secret PIN number and open a door lock (locking mechanism) 66 or transmit the results (e.g. a public key) for display on the card's LCD display (not shown). The base station can also place special codes or letters on the LCD, as a request or challenge to the cardholder to enter (on the card's keypad) other special numbers (other than the PIN), such as birth date, or Social Security Number, whereupon the validity of the entered special numbers may be confirmed by an RF-transmitted message from the base station on the card's LCD. The displayed message may also be a public code that can be matched against a public code preprinted on the ID card. These challenge questions may be calculated on the RF card or transmitted to the base station via the RF link and then computed on a central server/data processor 61, which may open the lock 66 or simultaneously transmit the results of the match to the internet or to a security department connected to a private network.
  • Preferably, RF card and base station will use low frequencies (e.g. under 1 MHz, such as 128 KHz) to advantageously maximize battery life in the RF ID card (and at the reader if the latter is battery powered).
  • If the base station interrogates cards via a loop antenna (field antenna) placed either in the floor or ceiling it is possible to localize and record an individual cardholder's progress, in position and time, as the individual proceeds through a secure facility. It is also possible, in accordance with the invention, to have a network comprising a large number of such ID's all within the reading range of one loop antenna (or interconnected set of loop antennae) that can be periodically interrogated by the base station. It should be noted that an additional advantage of low RF frequencies is that the cost of integrated circuits used for detection and transmittal of low RF frequencies is greatly reduced since CMOS based circuits may be used.
  • The tags may also be read and programmed by low cost handheld readers using a low frequency loop antenna communication link. Low cost locks may also be created using a simple CMOS chip set similar to that shown in FIG. 4, so that the lock and card set (together) may currently be manufactured at reasonable cost (e.g. for under $25.00).
  • BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1 is a schematic front view of an RF ID card tag/key in accordance with the present invention.
  • FIG. 2 is another front view of the RF ID card of FIG. 1, showing a photo ID card which may be incorporated therein.
  • FIG. 3 is a schematic rear view showing the back of the RF ID card of FIG. 1 and the keypad of keys thereon.
  • FIG. 4 is a schematic view of a novel RF ID card being used to open an electronic lock at a closed door.
  • FIG. 5 is a schematic block diagram of typical functional components of an RF ID card of the type shown in FIG. 1.
  • FIG. 6 is a schematic view of a system, in accordance with the invention, for tracking movements of individuals within a secure area, each individual being provided with an RF ID card of the type illustrated in FIGS. 1-3.
  • FIG. 7 is a schematic view of a handheld reader being used to check the identity of an ID card selected from a group of ID cards carried by corresponding cardholders.
  • FIG. 8 is a schematic block diagram showing the interaction of an electronic lock with and an RF card that incorporates a CPU data processor (e.g. microprocessor) and database.
  • FIG. 9 is a schematic block diagram showing the interaction of an electronic lock having a CPU data processor and database with and an RF card that does not incorporate a CPU data processor.
  • BRIEF DESCRIPTION OF PREFERRED EMBODIMENTS
  • FIG. 1 illustrates the front view of a typical RF ID card/tag 1 in accordance with the invention. The card 1, in a preferred embodiment, can be approximately 2½ inches by three and inches (i.e. slightly larger than a typical to credit card) and approximately ⅛th inch thick. The small hole 2 shown in FIG. 1 at the top of the card 1 is intended for use with an optional chain so that the card 1 can be conveniently held around the user's neck.
  • Two light emitting diodes (LED's) 3 are shown in positions on either side of hole.
  • The LED's 3 may optionally be multicolor or, alternatively, one may be green and the other red. Below the LED's 3 is shown an optional liquid Crystal Display (LCD). display 4, which may be numeric or alphanumeric. Below the display 4, an area 5 is reserved for a photo ID card 6 (as shown in FIG. 2) on flat face 1 a of card 1. A photo ID card 6 may optionally be attached by insertion into a plastic pouch adhering to the RF ID card/tag 1 by adhesive on the back of the photo ID card 6, or with adhesive directly applied to the RF card/tag, or by other mechanical means.
  • FIG. 2 illustrates that a photo ID card 6 may optionally be attached by a plastic pouch with adhesive on the back thereof, with adhesive directly applied to the ID photo card 6, or other mechanical means.
  • A desired public ID number 7 or other non-confidential sign may be printed on the RF card 1 (or on the attached photo ID card 6), so that number 7 may be visually compared to a number or sign 7 viewable in the LCD display 4 above it, by a security guard, for example. In one optional embodiment the user may be required to enter the PIN number 7 via the keypad 8 on the flat back 9 to RF card 1 (see FIG. 3 below), and the public key 7 displayed on display 4 on the front of RF card 1 is then calculated by a CPU 14 located within the RF card 1 (see FIG. 5).
  • In the third preferred embodiment of FIG. 9, the PIN number that is entered on the card's keypad may be sent via an RF link to a central server, which then calculates the public (non-confidential/non-secret) key and then returns that public key to the RF card for display on the LCD thereof. Other optional methods may also be used to calculate other numbers such as birth date, Social Security number, etc.
  • The public number is preferably long and unique and may be easily, and uniquely, calculated from a shorter secret PIN number entered on the RF card's keypad; by contrast, the secret PIN number may not be uniquely calculated from the public number. This is effectively a digital signature based on a secret 4 digit PIN password.
  • According to a preferred embodiment, the PIN number and the longer public ID number may be simply stored in the card's memory. The four bit microprocessor then simply compares the number entered on the keypad with the stored number and displays the public number. Thus:
  • PIN ENTERED ON CARD KEYPAD→CARD'S CPU MATCHES PIN TO PUBLIC NUMBER IN CARD'S DATABASE→CARD'S LCD DISPLAY'S PUBLIC NUMBER.
  • While it is possible for an attacker to devise a method to read these internal codes, it is easy to encrypt the stored information making it difficult for any unauthorized person to obtain the PIN number. A given public number may have many thousands of possible corresponding four digit PIN numbers. Since this public key calculation may be calculated by a CPU (programmed with a decryption algorithm) within the card, therefore neither the secret PIN number nor the corresponding public key number need be stored within a data storage device on the card itself. Thus, if sophisticated illegal attempts are made to crack card, these individuals will only be able to develop a large number of PIN number guesses. There are many public-key encryption/decryption algorithms available. Perhaps the most common is RSA, although others are also widely used, notably DSA (otherwise known as DSS, which is the USA federal Digital Signature Standard) and these would typically be calculated by a central server and not “on-card”. However, algorithmic decryption methods that are easy to calculate, with minimal computational resources, would be preferred in this RF ID card.
  • FIG. 3 illustrates the back view of the ID tag, in a preferred embodiment. Small buttons 8 of a keypad with symbols including * and # may be placed on the backside of the ID card 1 using rubber dome switches, or alternatively conventional membrane switches may be used to create a very flat profile. This keypad of entry buttons 8 may be used for a variety of purposes including entry of secret PIN numbers, birthdates, Social Security numbers, or the like, which are known only to the individual carrying the ID card 1.
  • FIG. 4 illustrates the preferred use of the RF ID card 1 (which may herein sometimes be called an “RF key” or “RF tag”) in opening a secure door 10 when brought within an effective transmission/communication range 12. If low frequencies (e.g. 128 KHz) are used for the RF ID communication link, it is possible to build an electronic lock 11, energized by long-lasting batteries (not shown), that can be placed within the thickness of the door 10. A preferred low power lock system is disclosed in U.S. provisional application No. 60/485860, filed Jul. 9, 2003, and entitled Integrated Lock, Drop-Box, and Delivery System and Method”. The user may open the door 10 using an RF ID card 1, or a card 1 and secret PIN number without any connection to a server of computer. This embodiment provides for a secure low cost access system that does not require any external wiring. Additionally, the door 10 may have no key pads or other visible objects or markings to indicate that it is a secure entryway.
  • FIG. 5 shows a block diagram of the functional component sections of a novel wireless key or RF access card 1, including an optional GPS chip set or GPS detector 13 to help locate the geographical position of a card user. FIG. 5 also shows the LCD display 4, a 4-bit microprocessor/CPU 14, a memory (data storage device) 15, an energy storage device in the form of a battery 18, a loop antenna 16, an RF modem serving as a transceiver 17 for communicating with a reader (as shown in FIG. 6 as base station Ww), and buttons 8 to enter commands (e.g. Open/close). As will be understood, keypad data entry buttons 8 may be located on the RF card 1 and connected to the CPU 14 for operations such as comparison by the CPU 14 of keypad-entered numbers with those stored in the memory 15 or displayed on the LCD display 4.
  • FIG. 6 illustrates another use of the RF cards 1, for tracking the location of individuals within a secure area. By placing large (e.g. 50 feet in diameter) field loop antennas 19 in walls, floor, or ceiling of a secure building, it is possible to create a network of wireless keys or RF access cards 1 carried by an individual after entering the secure building or secure area. Each RF card 1 can transmit at low frequency (<1.0 MHz), via a field antenna 19, to the base station/reader 20, which is connected to CPU/server 21, to confirm that each RF card 1 is present in the loop 19. By placing many such field loops 19 throughout a building it is possible to track, with full 2-way Rx/Tx 12, dates and times that individuals (bearing RF cards 1) walked into antenna-equipped areas within the building, or to track the locations and identities of individuals who were in a secure area at any time.
  • FIG. 7 illustrates the use of a small handheld reader 20 with a limited range of reception and transmission (i.e. Rx/Tx 12) to nearby RF cards 1. This reader 20 can be used to check identity of an RF cardholder, and optionally to program an RF card 1 for a new identity, when authorized.
  • In an embodiment of the invention, as shown in FIG. 8, a receiving unit or reader/base station 20 comprises an antenna 50 and a first central processing unit 51. The reader 20 is cooperatively positioned at a secure entryway, the first central processing unit 51 communicatively connected to the reader's antenna 50, and the reader's antenna communicatively connected to a transmitter 52 of a wireless key/RF card 1 via a wireless link 53, advantageously at a low RF frequency of less than 1 MHz (e.g. 300 Khz or 128 KHz). The wireless key/RF card 1 comprises a programmable memory 54, a second central processing unit 55, and a transmitter 52 (which should be understood to include an antenna and a receiving section), the wireless key 1 being physically separate from the secure doorway and typically stored in locations inaccessible to unauthorized users of the secure door. The wireless key 1 further comprises a key pad 56 with a plurality of buttons, the buttons being used to enter a secret access code. The second central processing unit 55 of the wireless key proceeds to determine whether the access code entered is consistent with the access code stored in the programmable memory 54. Upon the second central processing unit 55 determining that the access code entered is acceptable, the transmitter 52 of the wireless key/RF card 1 transmits a signal to the reader's antenna 50 when the user pushes an appropriate “OPEN” button. The first central processing unit 51 receives a signal from the antenna 50 and subsequently disengages the locking mechanism 57 to allow access to the interior of the secure door or area.
  • Another embodiment of the invention, as shown in FIG. 9, involves a receiving unit or reader/base station 20 comprising an antenna 60, a programmable memory 61, and a central processing unit 62. The reader 20 is cooperatively positioned within a secure area at a secured entryway, with the central processing unit 61 communicatively connected to the reader antenna 60 and the programmable memory 62, and the reader antenna 60 communicatively connected to a transmitter 63 of a wireless key via a wireless link 64, preferably at a low RF frequency of less than 1 MHz (e.g. 300 Khz or 128 KHz). The wireless key 1 comprises a transmitter 63 (which should be understood to include an antenna and a receiving section) that transmits a plurality of unlocking signals in sequential order, with one unlocking signal being sent upon the pushing of one of the buttons of the keypad 65 of the wireless key/RF card 1. The plurality of unlocking signals are received by the antenna 60 of reader 20 and processed by the central processing unit 61. If the sequence of unlocking signals transmitted by the wireless key 1 is consistent with the access code stored in the programmable memory 62, then the central processing unit 61 disengages the locking mechanism 66 of the secure door, thereby allowing the user of the wireless key/RF card 1 to be permitted access to the interior of the secure area.
  • While the present invention has been described with reference to preferred embodiments thereof, numerous obvious changes and variations may readily be made by persons skilled in the fields of identification cards and security systems. Accordingly, the invention should be understood to include all such variations to the full extent embraced by the claims.

Claims (27)

1. A system for controlling the operating state of a lock comprising:
a) a lock characterized by a locked state and an unlocked state;
b) a radio frequency reader, said reader being in operative communication with a lock to control the state thereof
c) a radio frequency identity card comprising:
i) an electronic input device (e.g. keypad) located on said card for entry of secret information by an individual;
ii) an electronic encoding means for facilitating conversion of said secret information into encoded secret information, said encoded secret information being determinative of authorization of said individual;
iii) a wireless transmitter operable to transmit information to said reader.
c) a data processor operable to determine whether said secret information corresponds to said authorization.
2. A system as set forth in claim 1, said radio frequency identity card further comprising an energy storage device operable to energize said wireless transmitter, said radio frequency reader and said wireless transmitter being operable at a low radio frequency not exceeding 1 megahertz.
3. A system as set forth in claim 1, said data processor being disposed within said card and operable to convert said encoded secret information into an unlocking signal and provide said unlocking signal to said wireless transmitter.
4. A system as set forth in claim 1, said reader and said data processor/cpu being disposed at said lock, said data processor being operable to convert said encoded secret information into an unlocking signal and provide said unlocking signal to said reader to unlock said lock.
5. A system of tracking movements of individuals within a secure area, said system comprising:
a) a loop antenna operable to transmit and receive RF signals from at least one radio frequency identity card;
b) a reader comprising a radio frequency transceiver operatively connected to said loop antenna;
c) at least one radio frequency identity card which can be located within communication range of said loop antenna, said radio frequency identity card comprising:
i) an electronic input device (e.g. keypad) located on said card for entry of secret information by an individual;
ii) an electronic encoding means for facilitating conversion of said secret information into encoded secret information, said encoded secret information being determinative of authorization of said individual;
iii) a wireless transmitter operable to transmit information to said reader;
d) a data processor operable to determine whether said secret information corresponds to said authorization.
6. A system as set forth in claim 5, said data processor being disposed within said card and operable to convert said encoded secret information into an authorization code.
7. A system as set forth in claim 5, said data processor being disposed at said reader and operable to convert said encoded secret information into an authorization code.
8. A system as set forth in claim 5, said radio frequency identity card further comprising an energy storage device operable to energize said wireless transmitter, said radio frequency reader and said wireless transmitter being operable at a low radio frequency not exceeding 1 megahertz.
9. An electronic identity card comprising:
a) an electronic input device (e.g. keypad) located on said card for entry of secret information by an individual;
b) a display for displaying public information for observation, said public information having a relationship to said secret information;
c) an electronic encoding means for facilitating conversion of said secret information into encoded secret information, said encoded secret information being determinative of the existence of a required correspondence between said secret information and said public information to confirm the identity of said individual.
10. An identity card as set forth in claim 9, said display comprising a permanent ID label attached to said card, said label containing public identity information relating to said individual.
11. An identity card as set forth in claim 9, said display comprising a LCD display on the ID card to display said encoded secret information.
12. An identity card as set forth in claim 9, said identity card further comprising: a low frequency wireless communication device operable at a frequency not exceeding 1 megahertz to transmit said encoded secret information to a reader spaced away from said identity card; and said identity card further comprising an energy storage device operable to energize said wireless transmitter
13. An identity card as set forth in claim 12, said communication device comprising a receiver for receiving a command signal from said reader and for displaying said public information on said display in response to said command signal.
14. An identity card as set forth in claim 12, said card comprising an indicator device (e.g. LED), said communication device comprising a receiver for receiving a command signal from said reader and for activating said indicator device in response to said command signal.
15. An electronic identity card comprising:
a) an electronic input device (e.g. keypad) located on said card for entry of secret information by an individual;
b) an electronic encoding means for facilitating conversion of said secret information into encoded secret information, said encoded secret information being determinative of authorization of said individual;
c) a wireless communication device operable to transmit said encoded secret information to a reader, said reader being in operative communication with a lock to control a locked state thereof.
16. An electronic identity card as set forth in claim 15, said identity card further comprising an energy storage device operable to energize said wireless communication device, said wireless communication device being operable at a low radio frequency not exceeding 1 megahertz.
17. An electronic identity card as set forth in claim 15, said electronic encoding means comprising a data processor/CPU and a data storage device. operable to store a lookup table/database of instances of secret information and corresponding instances of encoded secret information.
18. An electronic identity card as set forth in claim 15, said electronic encoding means comprising a data processor/CPU operable to algorithmically convert said secret information into said encoded secret information.
19. An electronic identity card as set forth in claim 18, said wireless communication device being operable to transmit both said secret information and said encoded secret information to a reader, said reader being in operative communication with a lock to control a locked state thereof.
20. An electronic identity card as set forth in claim 12, said card comprising an indicator device (e.g. LED) said communication device comprising a receiver for receiving a command signal from said reader and for activating said indicator device in response to said command signal.
21. A method for controlling the operating state of a lock characterized by a locked state and an unlocked state; said method comprising:
a) entering secret information on an electronic input device (e.g. keypad) located on a radio frequency identity card,
b) electronically comparing said secret information against an authorized code to determine whether said secret information is authorized,
c) transmitting by radio frequency an unlocking signal to a radio frequency reader located at said lock for opening said lock in the event that the secret information is authorized.
22. A method as set forth in claim 21, said radio frequency being a low radio frequency not exceeding 1 megahertz.
23. A method as set forth in claim 21, said comparing step (b) being carried out by a data processor disposed within said card and operable to convert said secret information into an unlocking signal and provide said unlocking signal to a wireless communication device.
24. A method as set forth in claim 21,said comparing step (b) being carried out by a data processor disposed at said reader, said data processor being operable to convert said encoded secret information into an unlocking signal and provide said unlocking signal to said reader to unlock said lock.
25. A method of tracking movements of individuals within a secure area, said method comprising:
a) using a loop antenna operable to transmit and receive RF signals from at least one radio frequency (RF) identity card;
b) transmitting RF signals from a reader through said loop antenna to said RF card to request a secret code,
c) entering said secret code on an electronic input device (e.g. keypad) device located on said RF card,
d) transmitting said secret code to said reader through a transceiver disposed on said RF card; and
e) using a data processor located at said reader, determining whether said secret code corresponds to said authorization.
26. A method of tracking movements of individuals within a secure area, said method comprising:
a) using a loop antenna operable to transmit and receive RF signals from at least one radio frequency (RF) identity card;
b) transmitting RF signals from a reader through said loop antenna to said RF card to request a secret code;
c) entering said secret code on an electronic input device (e.g. keypad) located on said RF card,
d) using a data processor located on said RF card, determining whether said secret information corresponds to said authorization; and
e) transmitting an authorization code to said reader through a transceiver disposed on said RF card.
27. A method as set forth in claim 26, said radio frequency not exceeding 1 megahertz.
US11/566,135 2000-08-28 2006-12-01 Low cost secure ID card and system Expired - Fee Related US7536721B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/566,135 US7536721B2 (en) 2000-08-28 2006-12-01 Low cost secure ID card and system

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US22855500P 2000-08-28 2000-08-28
PCT/US2001/026840 WO2002019092A1 (en) 2000-08-28 2001-08-28 A high security wireless key for asynchronous delivery drop boxes
US10/415,502 US7028339B2 (en) 2000-08-28 2001-08-28 High security wireless key for asynchronous delivery drop boxes
US46601603P 2003-04-28 2003-04-28
US48586003P 2003-07-09 2003-07-09
US10/832,853 US20040205350A1 (en) 2000-08-28 2004-04-27 Low cost secure ID card and system
US11/566,135 US7536721B2 (en) 2000-08-28 2006-12-01 Low cost secure ID card and system

Related Parent Applications (3)

Application Number Title Priority Date Filing Date
PCT/US2001/026840 Continuation-In-Part WO2002019092A1 (en) 2000-08-28 2001-08-28 A high security wireless key for asynchronous delivery drop boxes
US10/415,502 Continuation-In-Part US7028339B2 (en) 2000-08-28 2001-08-28 High security wireless key for asynchronous delivery drop boxes
US10/832,853 Continuation US20040205350A1 (en) 2000-08-28 2004-04-27 Low cost secure ID card and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/907,368 Division US8323810B2 (en) 2003-07-27 2010-10-19 Proton-conducting membrane and use thereof

Publications (2)

Publication Number Publication Date
US20070283160A1 true US20070283160A1 (en) 2007-12-06
US7536721B2 US7536721B2 (en) 2009-05-19

Family

ID=33136165

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/832,853 Abandoned US20040205350A1 (en) 2000-08-28 2004-04-27 Low cost secure ID card and system
US11/566,135 Expired - Fee Related US7536721B2 (en) 2000-08-28 2006-12-01 Low cost secure ID card and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/832,853 Abandoned US20040205350A1 (en) 2000-08-28 2004-04-27 Low cost secure ID card and system

Country Status (1)

Country Link
US (2) US20040205350A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080094177A1 (en) * 2006-06-16 2008-04-24 Visible Assets, Inc. Visible Assets Dot-Tag Visibility Network Architecture
US20120189125A1 (en) * 2009-09-22 2012-07-26 Jan Eichholz Method for establishing a secure communication channel
US10749693B2 (en) * 2015-10-21 2020-08-18 Rmd Innovations Pty. Ltd. Method and system for facilitating use of an electronically controlled lock

Families Citing this family (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE47599E1 (en) * 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US20050149226A1 (en) * 2002-04-09 2005-07-07 Ebox, Inc. Warehousing system and method
US7374106B1 (en) * 2001-05-15 2008-05-20 Nicholas Sheppard Bromer Triggered flickering tag
US20050043886A1 (en) * 2002-06-06 2005-02-24 John Stevens Delivery system and method for low visibilty conditions
TWI226588B (en) * 2003-04-23 2005-01-11 Winbond Electronics Corp Contactless radio frequency magnetic field data transmission card and associated application system
US8378841B2 (en) 2003-04-09 2013-02-19 Visible Assets, Inc Tracking of oil drilling pipes and other objects
US7864053B2 (en) * 2006-04-12 2011-01-04 Visible Assets, Inc. Visibility radio cap and network
US8026819B2 (en) 2005-10-02 2011-09-27 Visible Assets, Inc. Radio tag and system
US20070115132A1 (en) * 2005-06-10 2007-05-24 Visible Assets, Inc. Tagging and communication system and methods for use therewith
US8681000B2 (en) 2003-04-09 2014-03-25 Visible Assets, Inc. Low frequency inductive tagging for lifecycle management
US20100033330A1 (en) * 2003-04-09 2010-02-11 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US20050029345A1 (en) * 2003-07-09 2005-02-10 Paul Waterhouse Integrated lock, drop-box and delivery system and method
DE102004006504A1 (en) * 2004-02-10 2005-09-08 Infineon Technologies Ag Contactless data carrier with signal generator
WO2006031255A2 (en) * 2004-04-02 2006-03-23 Riptide Systems, Inc. Biometric identification system
US7623035B2 (en) * 2004-07-20 2009-11-24 Visible Assets, Inc RF-enablement of products and receptacles therefor
EP1844455A4 (en) * 2004-09-28 2009-02-11 Visible Assets Inc Rf tags for tracking and locating travel bags
US7456418B1 (en) * 2004-11-15 2008-11-25 Visible Assets, Inc RF-enablement of auditable storage for hazardous materials
US7990270B2 (en) 2005-01-28 2011-08-02 Kirsen Technologies Corporation Inc. Transportation security system and associated methods
US8643503B2 (en) 2005-01-28 2014-02-04 Kirill Mostov Transportation security system and associated methods
US7321290B2 (en) * 2005-10-02 2008-01-22 Visible Assets, Inc. Radio tag and system
KR20070005377A (en) * 2005-07-06 2007-01-10 주식회사 아이디테크 Method and system for managing going and coming of key tag for emitting light
US20080001716A1 (en) * 2006-07-03 2008-01-03 Stevens John K Method and Apparatus for Dynamically-Tuned Communication with One Among Myriad Tags
US9069933B1 (en) 2005-09-28 2015-06-30 Visible Assets, Inc. Secure, networked portable storage device
WO2007045051A1 (en) 2005-10-21 2007-04-26 Honeywell Limited An authorisation system and a method of authorisation
US7538681B1 (en) * 2006-09-19 2009-05-26 Onasset Intelligence, Inc. Method and apparatus for monitoring containerized ID tagged assets
US7667606B2 (en) * 2006-10-30 2010-02-23 Visible Assets, Inc RF enabled surgical cart and use of same in operating room environment
WO2008070788A2 (en) 2006-12-06 2008-06-12 Kirsen Technologies Corporation System and method for detecting dangerous objects and substances
EP2150901B1 (en) 2007-05-28 2015-09-16 Honeywell International Inc. Systems and methods for configuring access control devices
EP2153573B1 (en) 2007-05-28 2018-04-25 Honeywell International Inc. Systems and methods for commissioning access control devices
US8115472B2 (en) 2007-10-24 2012-02-14 Kirsen Technologies Corporation Inc. System and method for space control and remote monitoring
WO2009067627A1 (en) 2007-11-20 2009-05-28 Kirsen Technologies Corporation Apparatus for remote detection and monitoring of concealed objects
US20090273439A1 (en) * 2008-05-01 2009-11-05 Richard Selsor Micro-chip ID
JP4640451B2 (en) * 2008-06-06 2011-03-02 ソニー株式会社 Contact / non-contact composite IC card, communication method, program, and communication system
EP2332386A4 (en) 2008-09-30 2014-07-23 Honeywell Int Inc Systems and methods for interacting with access control devices
US8093986B2 (en) * 2009-01-20 2012-01-10 Lock II, L.L.C. Self-powered electronic lock
WO2010099575A1 (en) 2009-03-04 2010-09-10 Honeywell International Inc. Systems and methods for managing video data
EP2408984B1 (en) 2009-03-19 2019-11-27 Honeywell International Inc. Systems and methods for managing access control devices
US8668145B2 (en) * 2009-04-21 2014-03-11 Technology Innovators Inc. Automatic touch identification system and method thereof
US9280365B2 (en) 2009-12-17 2016-03-08 Honeywell International Inc. Systems and methods for managing configuration data at disconnected remote devices
US8387869B2 (en) * 2009-12-24 2013-03-05 International Business Machines Corporation Protecting electronic cards
US8707414B2 (en) 2010-01-07 2014-04-22 Honeywell International Inc. Systems and methods for location aware access control management
CN105516533A (en) * 2010-08-12 2016-04-20 上海科斗电子科技有限公司 Data transmission mode and application thereof
US8787725B2 (en) 2010-11-11 2014-07-22 Honeywell International Inc. Systems and methods for managing video data
US20130249670A1 (en) * 2010-12-09 2013-09-26 Getron Co., Ltd. Door lock system
US9894261B2 (en) 2011-06-24 2018-02-13 Honeywell International Inc. Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface
US9344684B2 (en) 2011-08-05 2016-05-17 Honeywell International Inc. Systems and methods configured to enable content sharing between client terminals of a digital video management system
US10362273B2 (en) 2011-08-05 2019-07-23 Honeywell International Inc. Systems and methods for managing video data
WO2013020165A2 (en) 2011-08-05 2013-02-14 HONEYWELL INTERNATIONAL INC. Attn: Patent Services Systems and methods for managing video data
US20130082933A1 (en) * 2011-10-04 2013-04-04 Symbol Technologies, Inc. Mobile computer with keypad-embedded rfid antenna
CN102496202A (en) * 2011-12-22 2012-06-13 东信和平智能卡股份有限公司 Wireless networking access control system supporting second-generation identification card and residence permit
CN103035049A (en) * 2012-12-12 2013-04-10 山东神思电子技术股份有限公司 FPGA (Field Programmable Gate Array)-based face recognition entrance guard device and FPGA-based face recognition entrance guard method
US8914863B2 (en) 2013-03-29 2014-12-16 Here Global B.V. Enhancing the security of near-field communication
US9485607B2 (en) 2013-05-14 2016-11-01 Nokia Technologies Oy Enhancing the security of short-range communication in connection with an access control device
US10523903B2 (en) 2013-10-30 2019-12-31 Honeywell International Inc. Computer implemented systems frameworks and methods configured for enabling review of incident data
CN104574602B (en) * 2015-01-22 2017-01-11 重庆同佳电子科技有限公司 Intelligent building entrance guard system capable of being conveniently detached and maintained
CN104574603B (en) * 2015-01-22 2016-11-02 梁蓓 A kind of intelligent building gate control system with sealed groove
US9500022B1 (en) * 2015-11-01 2016-11-22 Alexey Shesvill Slide safe apparatus and method
CN105321240B (en) * 2015-11-04 2018-02-16 北京果加智能科技有限公司 The control method and device and Intelligent door control system of intelligent door lock
US9990784B2 (en) 2016-02-05 2018-06-05 Hand Held Products, Inc. Dynamic identification badge
CN110889952A (en) * 2018-09-11 2020-03-17 Tcl-罗格朗国际电工(惠州)有限公司 Anti-lost control method, control device, equipment, storage medium and system
CN110780267B (en) * 2019-10-31 2021-06-11 四川九洲空管科技有限责任公司 Self-checking method for receiving and transmitting channel of navigation management inquiry response simulator

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3953769A (en) * 1974-07-29 1976-04-27 Sargent & Greenleaf, Inc. Electronic security control system
US4839506A (en) * 1986-04-25 1989-06-13 Casio Computer Co., Ltd. IC card identification system including pin-check time means
US4887445A (en) * 1989-05-30 1989-12-19 Sargent & Greenleaf, Inc. Electronic lock for hotel room safes and the like
US4959788A (en) * 1984-03-19 1990-09-25 Omron Tateisi Electronics Co. IC card with keyboard for prestoring transaction data
US5477039A (en) * 1990-10-09 1995-12-19 Gemplus Card International Method and device to increase the protection of a chip card
US5704151A (en) * 1995-03-24 1998-01-06 James Paul West Portable battery-powered safety lock
US5717776A (en) * 1994-03-30 1998-02-10 Kabushiki Kaisha Toshiba Certification card producing apparatus and certification card
US5787186A (en) * 1994-03-21 1998-07-28 I.D. Tec, S.L. Biometric security process for authenticating identity and credit cards, visas, passports and facial recognition
US6219439B1 (en) * 1998-07-09 2001-04-17 Paul M. Burger Biometric authentication system
US6257486B1 (en) * 1998-11-23 2001-07-10 Cardis Research & Development Ltd. Smart card pin system, card, and reader
US6535726B1 (en) * 2000-01-12 2003-03-18 Gilbarco Inc. Cellular telephone-based transaction processing

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3953769A (en) * 1974-07-29 1976-04-27 Sargent & Greenleaf, Inc. Electronic security control system
US4959788A (en) * 1984-03-19 1990-09-25 Omron Tateisi Electronics Co. IC card with keyboard for prestoring transaction data
US4839506A (en) * 1986-04-25 1989-06-13 Casio Computer Co., Ltd. IC card identification system including pin-check time means
US4887445A (en) * 1989-05-30 1989-12-19 Sargent & Greenleaf, Inc. Electronic lock for hotel room safes and the like
US5477039A (en) * 1990-10-09 1995-12-19 Gemplus Card International Method and device to increase the protection of a chip card
US5787186A (en) * 1994-03-21 1998-07-28 I.D. Tec, S.L. Biometric security process for authenticating identity and credit cards, visas, passports and facial recognition
US5717776A (en) * 1994-03-30 1998-02-10 Kabushiki Kaisha Toshiba Certification card producing apparatus and certification card
US5704151A (en) * 1995-03-24 1998-01-06 James Paul West Portable battery-powered safety lock
US6219439B1 (en) * 1998-07-09 2001-04-17 Paul M. Burger Biometric authentication system
US6257486B1 (en) * 1998-11-23 2001-07-10 Cardis Research & Development Ltd. Smart card pin system, card, and reader
US6535726B1 (en) * 2000-01-12 2003-03-18 Gilbarco Inc. Cellular telephone-based transaction processing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080094177A1 (en) * 2006-06-16 2008-04-24 Visible Assets, Inc. Visible Assets Dot-Tag Visibility Network Architecture
US20120189125A1 (en) * 2009-09-22 2012-07-26 Jan Eichholz Method for establishing a secure communication channel
US8953804B2 (en) * 2009-09-22 2015-02-10 Giesecke & Devrient Gmbh Method for establishing a secure communication channel
US10749693B2 (en) * 2015-10-21 2020-08-18 Rmd Innovations Pty. Ltd. Method and system for facilitating use of an electronically controlled lock

Also Published As

Publication number Publication date
US7536721B2 (en) 2009-05-19
US20040205350A1 (en) 2004-10-14

Similar Documents

Publication Publication Date Title
US7536721B2 (en) Low cost secure ID card and system
US6340116B1 (en) Proximity card with incorporated pin code protection
US8090945B2 (en) Systems and methods for multi-factor remote user authentication
US8373540B2 (en) Anti-identity theft and information security system process
US9100826B2 (en) Method and apparatus for secure access payment and identification
EP1470526B1 (en) System and method of reading a security clearance card
US20050001712A1 (en) RF ID tag
EP0924657A2 (en) Remote idendity verification technique using a personal identification device
EP1898362B1 (en) Document management system
US20080172733A1 (en) Identification and verification method and system for use in a secure workstation
WO2005080720A1 (en) Method of authorization
GB2372860A (en) Authentication system using position information
US20090164787A1 (en) Method and system for the transmission of identification signals
US20060136734A1 (en) Identification display device
WO2009001394A1 (en) Contact less smart card with facial recognition
US6742714B2 (en) Proximity card with incorporated PIN code protection
US20090278660A1 (en) Credit card protection system
US20190028470A1 (en) Method For Verifying The Identity Of A Person
GB2428116A (en) Controlling access to a workstation via wireless communication
CN100483443C (en) Biological key and biological lock
WO2003063074A1 (en) Proximity card with incorporated pin code protection
KR20090089191A (en) Rfid unit, controlling method for the same, door locking device using the same and electric power supply using the same
JP2002007353A (en) Authentication system, authentication method using the same, and data utilizing method

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 8

SULP Surcharge for late payment

Year of fee payment: 7

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210519